Fake CAPTCHA Verification Pages Spreading Lumma Stealer Malware
A new phishing campaign uses fake CAPTCHA verification pages to trick Windows users into running malicious PowerShell commands, installing the Lumma Stealer malware and stealing…
A new phishing campaign uses fake CAPTCHA verification pages to trick Windows users into running malicious PowerShell commands, installing the Lumma Stealer malware and stealing…
Silver Spring, Maryland, September 19th, 2024, CyberNewsWire Aembit, the non-human identity and access management (IAM) company, today released its 2024 Non-Human Identity Security Report, a…
The U.S. Treasury sanctions the Intellexa Consortium and key figures for distributing Predator spyware, a serious national security threat. Intellexa, a rival to NSO Group,…
The FBI, in collaboration with U.S. government agencies, dismantled a Chinese state-backed botnet known as Flax Typhoon, comprising 260,000 compromised IoT devices. This operation neutralized…
A VPN (Virtual Private Network) adds privacy and security to your browsing. But does this make your internet activity truly anonymous? Or is total privacy…
Europol, alongside global law enforcement, dismantled the encrypted chat app Ghost, widely used by criminal networks for drug trafficking, money laundering, and violent crime. The…
Censys uncovers the hidden infrastructure of Fox Kitten, an Iranian cyberespionage group. It reveals unique patterns, potential new IOCs, and actionable recommendations to protect your…
A server misconfiguration exposed a trove of documents belonging to FleetPanda, a leading petroleum and fuel industry software provider. Sensitive data including invoices, driver applications,…
Austin, TX, September 18th, 2024, CyberNewsWire Research indicates that an infostealer malware infection is often a precursor to a ransomware attack SpyCloud, the leader in…
Cary, North Carolina, September 18th, 2024, CyberNewsWire INE Security is proud to announce that it has been named a winner in the prestigious 2024 SC…
Discover the RAMBO attack, a groundbreaking method that uses electromagnetic waves to steal data from air-gapped systems. Learn how hackers exploit isolated networks using electromagnetic…
RansomHub ransomware group leaks alleged 487 GB of sensitive data stolen from Kawasaki Motors Europe (KME), following a cyberattack. The breach includes business documents and…